Skip to content

Commit 17a239e

Browse files
committed
Add /var/lib/containers/storage/ to illegal mount validation.
Due to the virtiofs filesystem limitations, it cannot deal with multiple uids/gids that are required for the container storage. Fixes: #27183 Signed-off-by: Lili Nie <[email protected]>
1 parent 9570f99 commit 17a239e

File tree

2 files changed

+2
-0
lines changed

2 files changed

+2
-0
lines changed

RELEASE_NOTES.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@
3636
- The `--mount type=artifact` option to `podman create`, `podman run`, and `podman pod create` now mounts artifacts containing a only a single blob as a file at the given destination path if the path does not exist in the image.
3737
- The `podman volume export` command now refuses to export to `STDOUT` if it is a TTY ([#26506](https://github.com/containers/podman/issues/26506)).
3838
- When generating Quadlet units with options known to be problematic when used with Podman, such as `User=`, `Group=`, and `DynamicUser=` in the `[Service]` section of a unit, Quadlet will now warn the user of the potential incompatibility ([#26543](https://github.com/containers/podman/issues/26543)).
39+
- The `podman machine init` command now throws out errors if users try to mount `/var/lib/containers/storage/`, which podman is not able to support, due to virtiofs filesystem limitations with multiple UIDs/GIDs ([#27183](https://github.com/containers/podman/issues/27183)).
3940

4041
### Bugfixes
4142
- Fixed a bug where the `--security-opt unmask=` option to `podman create` and `podman run` did not allow comma-separated lists of paths to be passed, instead only allowing a single path.

pkg/machine/shim/host.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -833,6 +833,7 @@ func validateDestinationPaths(dest string) error {
833833
"/tmp": {},
834834
"/usr": {},
835835
"/var": {},
836+
"/var/lib/containers/storage/": {},
836837
}
837838
mountTarget := path.Clean(dest)
838839
if _, ok := illegalMounts[mountTarget]; ok {

0 commit comments

Comments
 (0)